Cisco VCS Authenticating Devices Deployment Guide X7-2
Cisco VCS Authenticating Devices Deployment Guide X7-2
Cisco VCS
Deployment Guide
Cisco VCS X7.2
D14819.06
August 2012
Contents
Contents
Introduction ......................................................................................................................... 4
Appendix 4 — Active Directory (direct): Example DNS SRV configuration for AD ........28
DNS SRV values needed ...................................................................................................................... 28
Web browser checking of DNS SRV settings........................................................................................ 28
Dig command to check DNS SRV settings ........................................................................................... 28
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 2 of 50
Contents
Appendix 7 — Active Directory (direct): Checking domain information and VCS status
....................................................................................................................................33
Domain_management ........................................................................................................................... 33
Net ads info ........................................................................................................................................... 33
Net ads testjoin ...................................................................................................................................... 34
Appendix 11 — Example process for moving Movi / Jabber Video users to AD direct
authentication............................................................................................................38
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 3 of 50
Introduction
Introduction
Device authentication is the verification of the credentials of an incoming request to the Cisco
TelePresence Video Communication Server (Cisco VCS) from a device or external system. It is used
so that certain functionality may be reserved for known and trusted users, for example the publishing
of presence status, collection of provisioning data, or the ability to use resources that cost money like
ISDN gateway calling.
When device authentication is enabled on a VCS, any device that attempts to communicate with the
VCS will be challenged to present its credentials (typically based on a username and password). The
VCS will then verify those credentials, or have them verified, according to its authentication policy, and
then accept or reject the message accordingly.
VCS authentication policy can be configured separately for each zone and subzone. This means that
both authenticated and unauthenticated devices could be allowed to register to, and communicate
with, the same VCS if required. Subsequent call routing decisions can then be configured with
different rules based upon whether a device is authenticated or not.
As from version X7.2, the VCS attempts to verify the credentials presented to it by first checking
against its on-box local database of usernames and passwords. The local database also includes
checking against credentials supplied by Cisco TMS if your system is using device provisioning.
If the username is not found in the local database, the VCS may then attempt to verify the credentials
via a real-time LDAP connection to an external H.350 directory service. The directory service, if
configured, must have an H.350 directory schema for either a Microsoft Active Directory LDAP server
or an OpenLDAP server.
Along with one of the above methods, for those devices that support NTLM challenges, the VCS can
alternatively verify credentials via direct access to an Active Directory server using a Kerberos
connection. See Configuring VCS authentication methods for more information.
The various VCS authentication entry points and credential checking methods are shown below:
Neighbor
System Other Active
Default Default via Kerberos
Zone Subzone Subzones Directory
(if configured) database
Endpoint
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 4 of 50
Configuring VCS authentication policy
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 5 of 50
Configuring VCS authentication policy
You can configure the VCS to use policy services in the following areas:
Registration Policy
Search rules (dial plan)
Call Policy
User Policy (FindMe)
When the Cisco VCS uses a policy service it sends information about the call or registration request to
the service in a POST message using a set of name-value pair parameters. Those parameters include
information about whether the request has come from an authenticated source or not.
More information about policy services, including example CPL, can be found in External policy on
VCS deployment guide.
CPL
If you are using the Call Policy rules generator on the VCS, source matches are carried out against
authenticated sources. To specify a match against an unauthenticated source, just use a blank field.
(If a source is not authenticated, its value cannot be trusted).
If you use uploaded, handcrafted local CPL to manage your Call Policy, you are recommended to
make your CPL explicit as to whether it is looking at the authenticated or unauthenticated origin.
If CPL is required to look at the unauthenticated origin (for example, when checking non-
authenticated callers) the CPL must use “unauthenticated-origin”. (However, if the user is
unauthenticated, they can call themselves whatever they like; this field does not verify the caller.)
To check the authenticated origin (only available for authenticated or “treat as authenticated”
devices) the CPL should use “authenticated-origin”.
Note that due to the complexity of writing CPL scripts, you are recommended to use an external policy
service instead.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 6 of 50
Configuring VCS authentication policy
phone book
subscribe requests Credential checking device
message (against local database / TMS credentials
other credentials, H.350 directory,
messages or Active Directory)
Endpoint
The VCS must be configured with appropriate device authentication settings, otherwise provisioning-
related messages will be rejected:
Initial provisioning authentication (of a subscribe message) is controlled by the authentication
policy setting on the Default Zone. (The Default Zone is used as the device is not yet registered.)
• The Default Zone and any traversal client zone's authentication policy must be set to either
Check credentials or Treat as authenticated, otherwise provisioning requests will fail.
The authentication of subsequent messages, including registration requests, phone book requests
and call signaling messages is controlled by the authentication policy setting on the Default
Subzone (or relevant alternative subzone) if the endpoint is registered (which is the usual case),
or by the authentication policy setting on the Default Zone if the endpoint is not registered.
• The relevant authentication policy must be set to either Check credentials or Treat as
authenticated, otherwise phone book requests will fail.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 7 of 50
Configuring VCS authentication policy
In each case, the VCS performs its authentication checking against the appropriate credential store,
according to whichever authentication methods are configured. Note that if the VCS is using the local
database, this will include all credentials supplied by TMS.
For more information about provisioning configuration in general, see Cisco TMS Provisioning
Extension Deployment Guide.
Provisioning Server
VCS challenges and checks
credentials against TMS
TMS Agent database device
(if message is not already Agent credentials
Provisioning authenticated) database
Server
phone book
subscribe requests Credential checking
Cisco TMS
message (against local database / TMS
other Agent database, H.350 directory,
messages or Active Directory)
Endpoint
Note that:
Initial provisioning authentication (of a subscribe message) is controlled by the authentication
policy setting on the Default Zone. (The Default Zone is used as the device is not yet registered).
Subsequent messages, including registration requests, phone book requests and call signaling
messages go through the Default Subzone (or relevant alternate subzone).
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 8 of 50
Configuring VCS authentication policy
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 9 of 50
Configuring VCS authentication policy
VCS
Presence Server does not
Presence challenge or check credentials
(publish messages must have already
Server been authenticated)
Cisco TMS
Def ault Zone and Def ault
Subzone (or relevant alternative
subzone) must be conf igured to
Default Default challenge and check credentials
Zone Subzone
Presence
publish
messages
Unregistered Registered
endpoint endpoint
In each case, the VCS performs its authentication checking against the appropriate credential store,
according to whichever authentication methods are configured. Note that if the VCS is using the local
database, this will include any credentials supplied by TMS (in either TMS Agent legacy mode or TMS
Provisioning Extension mode).
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 10 of 50
Configuring VCS authentication policy
Infrastructure devices
You are recommended to configure your VCS so that infrastructure products, such as MCUs, register
to a dedicated subzone with an authentication policy set to Treat as authenticated.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 11 of 50
Configuring VCS authentication policy
VCS Expressway
Ideally, VCS Expressway authentication policy, should follow exactly the same guidelines as for the
VCS Control. However if AD Direct or H.350 access is required, many security policies will not allow a
device in a DMZ access to those resources. Practicality therefore recommends that authentication is
left to the VCS Control.
Use registration allow and deny lists to limit what can register to the Expressway. If it is required that
outbound calls may only be made by authenticated users, ensure that all call requests are routed to
the VCS Control and it only forwards requests back that it can authenticate.
See also Appendix 12 — Example AD direct authentication deployments.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 12 of 50
Configuring VCS authentication methods
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 13 of 50
Configuring VCS authentication methods
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 14 of 50
Configuring VCS authentication methods
Starter Pack
If the Starter Pack option key is installed, the local authentication database will include a pre-
configured set of authentication credentials. To ensure correct operation of the TURN server in
conjunction with the Starter Pack, do not delete or modify the StarterPackTURNUser entry in the
local authentication database.
All other credentials that are required to support Starter Pack provisioned devices have to be added
manually for each user account.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 15 of 50
Configuring VCS authentication methods
3. Click Save.
Connection is successful when the Status reports State Active.
Note that authentication credentials (for Digest challenges) are always checked first against the local
database. The H.350 directory service is subsequently checked only if the username is not found in
the local database.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 16 of 50
Configuring VCS authentication methods
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 17 of 50
Configuring VCS authentication methods
Configuration prerequisites
Active Directory
A username and password of an AD user account with either “account operator” or “administrator”
access rights must be available for the Cisco VCS to use for joining and leaving the domain.
Entries must exist in the Active Directory server for all devices that are to be authenticated
through this method. Each entry must have an associated password.
The device entries (in all domains) must be accessible by the user account that is used by VCS to
join the domain. If the VCS is in a domain that is part of a forest, and there is trust between
domains in the forest, the VCS can authenticate device entries from different domains providing
the user account has appropriate rights to authenticate devices against the other domains.
DNS server
If a DNS name or DNS SRV name is used to identify the AD servers, a DNS server must be
configured with the relevant details. (Note that the VCS must be configured to use a DNS server
even if you are not using DNS / DNS SRV to specify the AD servers.)
Cisco VCS
The VCS must be configured to use a DNS server (System > DNS).
• The VCS’s Local host name (System > DNS) must be 15 or fewer characters long.
(Microsoft NetBIOS names are capped at 15 characters.)
• When part of a cluster, ensure that each Cisco VCS peer has a unique Local host name.
Ensure that an NTP server (System > Time) has been configured and is active.
Ensure that the VCS is configured to challenge for authentication on the relevant zones and
subzones:
• The Default Zone (VCS configuration > Zones > Zones, then select Default Zone) must be
configured with an Authentication policy of Check credentials. This ensures that
provisioning requests (and any call requests from non-registered devices) are challenged.
• The Default Subzone (VCS configuration > Local Zone > Default Subzone) – or the
relevant subzones - must be configured with an Authentication policy of Check credentials.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 18 of 50
Configuring VCS authentication methods
This ensures that registration, presence, phone book and call requests from registered
devices are challenged.
Note that setting up your VCS’s authentication policy to check credentials will affect all
devices (not just Movi) that send provisioning, registration, presence, phone book and call
requests to the VCS.
Endpoint
The PC on which Movi runs must use appropriate settings which match the settings of the AD
server (see Appendix 4 — Active Directory (direct): Movi PC and AD server compatibility
configuration).
IT request
You can use the questionnaire in Appendix 1 — IT requisition to get the appropriate information from
your IT department).
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 19 of 50
Configuring VCS authentication methods
(Kerberos Key Distribution Center). It should be kept in step with the clock skew
setting on the KDC; generally this will be its default value of 300 (5 minutes).
Ensure that VCS and KDC are synchronized to time servers.
Use DNS SRV You are recommended to leave this field set to Yes.
lookup to obtain This means that VCS will use a DNS SRV lookup of <AD DOMAIN> to obtain the
Domain Controller address details of the AD domain controllers.
addresses If the lookup cannot provide the addresses then set this field to No and enter the
IP address of the primary Domain Controller into the Address 1 field that will be
displayed.
Use DNS SRV You are recommended to leave this field set to Yes.
lookup to obtain This means that VCS will use a DNS SRV lookup of <AD DOMAIN> to obtain the
Kerberos Key address details of the Kerberos Key Distribution Center servers.
Distribution Center If the lookup cannot provide the addresses then set this field to No and enter the
addresses IP address of the primary Key Distribution Center servers into the Address 1 field
that will be displayed. Typically, Port 1 can be left as its default value of 88.
Note that Key Distribution Center addresses are typically the same as the Domain
Controller addresses.
Username and Enter the AD domain administrator username and password. The password is
Password case sensitive.
The credentials must be supplied whenever you attempt to join a domain. The
VCS only needs to join the domain once, after which the connection can be
enabled or disabled as required.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 20 of 50
Configuring VCS authentication methods
The domain administrator username and password are not stored in VCS; they are only required
to join an AD domain (or to leave a domain – see Appendix 8 — Active Directory (direct):
Leaving a domain).
The VCS only needs to join the AD domain once, even if the connection to the Active Directory
Service is disabled and turned back on again. The only time a join is needed again is if the VCS
leaves the domain or needs to join a different domain.
Add non-primary Domain Controllers and Kerberos Key Distribution Center servers
(optional)
This step is only required if you are not using DNS SRV lookups of <AD DOMAIN> to obtain the
address details of the Domain Controller servers and the Kerberos Key Distribution Center servers.
1. Go to VCS configuration > Authentication > Devices > Active Directory Service.
2. Enter up to 4 further Domain Controller server addresses (up to 5 in total).
3. Enter up to 4 further Kerberos Key Distribution Center server addresses and port numbers (up to
5 in total).
4. Click Save.
5. If the VCS is part of a cluster, check that the configuration entered on the master peer has been
replicated to each other peer.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 21 of 50
Configuring VCS authentication methods
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 22 of 50
Appendix 1 — Troubleshooting
Appendix 1 — Troubleshooting
This section provides information to help troubleshoot and resolve authentication issues.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 23 of 50
Appendix 1 — Troubleshooting
PC fails to login after a video endpoint has had AD direct authentication login failures
If the AD Authentication has a limit to the number of failed logins that are allowed, failed logins from an
endpoint will affect authentication of anything else that uses AD to authenticate.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 24 of 50
Appendix 2 — IT requisition
Appendix 2 — IT requisition
H.350 directory service:
IT requisition (for LDAP access to H.350 directory
service)
To: IT Department
Please supply the following details so that the Cisco VCS can be configured to authenticate video
endpoint calls using LDAP access to the H.350 directory service server.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 25 of 50
Appendix 2 — IT requisition
To: IT Department
Please supply the following details so that the Cisco VCS can be configured to access the Active
Directory server to authenticate video endpoint calls.
Administrator username
(used for joining the VCS to the domain)
Administrator password
(used for joining the VCS to the domain)
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 26 of 50
Appendix 3 — SIP messages for a provisioning subscription
Subscribe
Subscribe
with SIP header: ‘Proxy-Authorization:
NTLM qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>", gssapi-
data=""’
Subscribe
with ‘Proxy-Authorization: NTLM
qop="auth", realm="<VCSHostID>",
targetname="<VCSHostID>",
opaque="<opData>", gssapi-
data="<MoviGsData>"’
Subscribe
with SIP header: ‘P-Asserted-Identity:
<sip:<assertedID>>’
200 OK
200 OK
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 27 of 50
Appendix 4 — Active Directory (direct): Example DNS SRV configuration for AD
Enter the SRV path in the Host field and click Lookup.
root# dig <DNS server> -t any <full dnssrv record, e.g. _ldap._tcp.dc._msdcs.<DOMAIN>>
Example response:
; <lt;>> DiG 9.2.2 <lt;>> <DNS server> -t any <full dnssrv record>
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3072
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 2
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 28 of 50
Appendix 4 — Active Directory (direct): Example DNS SRV configuration for AD
;; QUESTION SECTION:
; <full dnssrv record>. IN ANY
;; ANSWER SECTION:
<full dnssrv record>. 600 IN SRV 0 100 389 <A record 1>.
<full dnssrv record>. 600 IN SRV 0 100 389 <A record 2>.
;; ADDITIONAL SECTION:
<A record 1>. 3600 IN A <IP address 1>
<A record 2). 1200 IN A <IP address 2>
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 29 of 50
Appendix 5 — Active Directory (direct): Movi PC and AD server compatibility configuration
AD Domain Controller
DC accepts
LM NTLM NTLM 2
Level
0
1
2
3
4 -
5 - -
Compatibilities
AD Domain Controller Level Movi client PC
0, 1, 2, 3, 4 0, 1, 2, 3, 4, 5
5 3, 4, 5
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 30 of 50
Appendix 5 — Active Directory (direct): Movi PC and AD server compatibility configuration
On VCS prior to X7.1, if NtlmMinClientSec is set to mandate "NTLM 2 session security" Movi
authentication will fail.
Recommended client setting for use with VCS software X7.1 and later:
LmCompatibilitylevel set to 3, 4 or 5
NtlmMinClientSec set to 0x20080000
With the above settings, the Movi client will use NTLMv2 with 128-bit encrypted NTLM 2 session
security.
From Microsoft:
Value: NtlmMinClientSec
Value Type: REG_DWORD - Number
Valid Range: the logical 'or' of any of the following values:
0x00000010
0x00000020
0x00080000
0x20000000
Default: 0
Value: NtlmMinServerSec
Value Type: REG_DWORD - Number
Valid Range: same as NtlmMinClientSec
Default: 0
Description: This parameter specifies the minimum security to be used.
0x00000010 Message integrity
0x00000020 Message confidentiality
0x00080000 NTLMv2 session security
0x20000000 128 bit encryption
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 31 of 50
Appendix 6 — IP Ports used on VCS for authentication
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 32 of 50
Appendix 7 — Active Directory (direct): Checking domain information and VCS status
Domain_management
1. Login as root over SSH or via the serial interface, then type:
domain_management
Note that the domain administrator username and password are not stored in VCS; they are only used
in Join AD domain, Leave AD domain and VCS Status operations.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 33 of 50
Appendix 7 — Active Directory (direct): Checking domain information and VCS status
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 34 of 50
Appendix 8 — Active Directory (direct):
Leaving a domain
To get VCS to leave the AD domain, access to VCS via the root login is required.
1. Login as root over SSH or via the serial interface, then type:
a. domain_management
you will be presented with the options:
----------------------------------------
1) Join Domain
2) Leave Domain
3) VCS Status
4) Domain Information
5) Exit
----------------------------------------
b. Choose option 2 Leave Domain
c. When asked, enter the domain administrator username
d. When asked, enter the domain administrator password (case sensitive)
Note: the domain administrator username and password are not stored in VCS; they are only
used in Join AD domain, Leave AD domain and VCS Status operations.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 35 of 50
Appendix 9 — Certificates for TLS
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 36 of 50
Appendix 10 — Use with Cisco VCS clusters
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 37 of 50
Appendix 11 — Example process for moving Movi / Jabber Video users to AD direct authentication
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 38 of 50
Appendix 12 — Example AD direct authentication deployments
AD
Database
Register
This example shows a subscribe for provisioning that is challenged using AD (direct) authentication:
Provisioning Active
SIP UA VCS Control
server Directory
Subscribe
CSeq: <xx> SUBSCRIBE
Subscribe
CSeq: <xx + 1> SUBSCRIBE
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 39 of 50
Appendix 12 — Example AD direct authentication deployments
Provisioning Active
SIP UA VCS Control
server Directory
with SIP header: ‘Proxy-Authorization: NTLM
qop="auth", realm="<VCSHostID>",
targetname="<VCSHostID>", gssapi-data=""’
Subscribe
CSeq: <xx + 2> SUBSCRIBE
with ‘Proxy-Authorization: NTLM qop="auth",
realm="<VCSHostID>", targetname="<VCSHostID>",
opaque="<opData>", gssapi-data="<MoviGsData>"’
Verify credentials
Verify OK
Subscribe
CSeq: <xx + 2>
SUBSCRIBE
with SIP header: ‘P-
Asserted-Identity:
<sip:<assertedID>>’
200 OK
200 OK
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 40 of 50
Appendix 12 — Example AD direct authentication deployments
AD
Database
Register Register
SIP domain Domain for SIP account Domain for SIP account
This example shows a subscribe for provisioning that is challenged using an AD (direct) authentication
challenge by the VCS Expressway. It is then forwarded on to the VCS Control which in turn passes it
to the provisioning server:
Subscribe
CSeq: <xxx> SUBSCRIBE
Subscribe
CSeq: <xxx + 1> SUBSCRIBE
with SIP header: ‘Proxy-
Authorization: NTLM qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
gssapi-data=""’
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 41 of 50
Appendix 12 — Example AD direct authentication deployments
Subscribe
CSeq: <xxx + 2> SUBSCRIBE
with ‘Proxy-Authorization: NTLM
qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
opaque="<opData>", gssapi-
data="<MoviGsData>"’
Verify credentials
Verify OK
Subscribe
CSeq: <xxx+2> SUBSCRIBE
with SIP header: ‘P-Asserted-
Identity: <sip:<assertedID>>’
Subscribe
CSeq: <xxx+2>
SUBSCRIBE
with SIP header: ‘P-
Asserted-Identity:
<sip:<assertedID>>’
200 OK
with SIP Record-Route
apparent=replace;prox
y-call-id,
apparent=remove;prox
y-call-id
200 OK
with SIP Record-Route
apparent=replace;proxy-call-id,
apparent=remove;proxy-call-id
200 OK
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 42 of 50
Appendix 12 — Example AD direct authentication deployments
AD
Database
Register
SIP domain Domain for SIP account Domain for SIP account
This example shows a subscribe for provisioning that is challenged using an AD (direct) authentication
challenge by the VCS Control:
Subscribe
CSeq: <xxx> SUBSCRIBE
Subscribe
CSeq: <xxx> SUBSCRIBE
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 43 of 50
Appendix 12 — Example AD direct authentication deployments
Subscribe
CSeq: <xxx + 1> SUBSCRIBE
with SIP header: ‘Proxy-
Authorization: NTLM qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
gssapi-data=""’
Subscribe
CSeq: <xxx + 1> SUBSCRIBE
with SIP header: ‘Proxy-
Authorization: NTLM qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
gssapi-data=""’
Subscribe
CSeq: <xxx + 2> SUBSCRIBE
with ‘Proxy-Authorization: NTLM
qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
opaque="<opData>", gssapi-
data="<MoviGsData>"’
Subscribe
CSeq: <xxx + 2> SUBSCRIBE
with ‘Proxy-Authorization: NTLM
qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
opaque="<opData>", gssapi-
data="<MoviGsData>"’
Verify credentials
Verify OK
Subscribe
CSeq: <xxx+2>
SUBSCRIBE
with SIP header: ‘P-
Asserted-Identity:
<sip:<assertedID>>’
200 OK
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 44 of 50
Appendix 12 — Example AD direct authentication deployments
200 OK
with SIP Record-Route
apparent=replace;proxy-call-id,
apparent=remove;proxy-call-id
200 OK
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 45 of 50
Appendix 12 — Example AD direct authentication deployments
AD
Database
Register
Subscribe
CSeq: <xxx> SUBSCRIBE
Subscribe
CSeq: <xxx> SUBSCRIBE
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 46 of 50
Appendix 12 — Example AD direct authentication deployments
Subscribe
CSeq: <xxx + 1> SUBSCRIBE
with SIP header: ‘Proxy-
Authorization: NTLM qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
gssapi-data=""’
Subscribe
CSeq: <xxx + 1> SUBSCRIBE
with SIP header: ‘Proxy-
Authorization: NTLM qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
gssapi-data=""’
Subscribe
CSeq: <xxx + 2> SUBSCRIBE
with ‘Proxy-Authorization: NTLM
qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
opaque="<opData>", gssapi-
data="<MoviGsData>"’
Subscribe
CSeq: <xxx + 2> SUBSCRIBE
with ‘Proxy-Authorization: NTLM
qop="auth",
realm="<VCSHostID>",
targetname="<VCSHostID>",
opaque="<opData>", gssapi-
data="<MoviGsData>"’
Verify credentials
Verify OK
Subscribe
CSeq: <xxx+2>
SUBSCRIBE
with SIP header: ‘P-
Asserted-Identity:
<sip:<assertedID>>’
200 OK
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 47 of 50
Appendix 12 — Example AD direct authentication deployments
200 OK
with SIP Record-Route
apparent=replace;proxy-call-id,
apparent=remove;proxy-call-id
200 OK
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 48 of 50
Document revision history
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 49 of 50
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE
WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO
BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST
TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE
INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS
REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR
CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California,
Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981,
Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE
SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL
WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR
TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR
INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING
OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of
Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their
respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other
company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and
phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is
unintentional and coincidental.
© 2012 Cisco Systems, Inc. All rights reserved.
VCS Deployment Guide: Device authentication on Cisco VCS (VCS X7.2) Page 50 of 50